{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T03:24:41Z","timestamp":1725506681809},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/icumt.2009.5350880","type":"proceedings-article","created":{"date-parts":[[2009,12,10]],"date-time":"2009-12-10T10:44:36Z","timestamp":1260441876000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Towards an ideal network: Survivability issues in selected topologies"],"prefix":"10.1109","author":[{"given":"Tomasz","family":"Gierszewski","sequence":"first","affiliation":[]},{"given":"Wojciech","family":"Molisz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Lessonsfrom three views of the Internet toootozv","year":"2005","author":"mahadevan","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2008.04.011"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2002.806338"},{"key":"ref13","first-page":"13382","article-title":"Modeling the Internet's large-scale topology","author":"yook","year":"2001","journal-title":"cond-mat\/0107417"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380211102"},{"key":"ref3","first-page":"110","article-title":"Heuristically optimized trade-offs: a new paradigm for power laws in the Internet","author":"fabrikant","year":"2002","journal-title":"Proc ICALP"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/11875567_3"},{"key":"ref5","article-title":"CRVG-a new model for wireless networks topology generation","author":"gierszewski","year":"2009","journal-title":"Proc 16th Polish Teletraffic Symposium"},{"key":"ref8","first-page":"547","article-title":"Critical power for asymptotic connectivity in wireless networks","author":"gupta","year":"1998","journal-title":"Stochastic Analysis Control Optimization and Applications A"},{"key":"ref7","article-title":"Scale-free networks","author":"gierszewski","year":"2004","journal-title":"Scientific Report 14\/2004"},{"journal-title":"Survivable Networks Algorithms for Diverse Routing","year":"1999","author":"bhandari","key":"ref2"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","article-title":"Emergence of scaling in random networks","author":"barabasi","year":"1999","journal-title":"Science 286"},{"key":"ref9","article-title":"Localized algorithms for detection of critical nodes and links for connectivity in ad hoc networks","author":"jorgic","year":"2004","journal-title":"The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop Med-Hoc-net"}],"event":{"name":"Workshops (ICUMT)","start":{"date-parts":[[2009,10,12]]},"location":"St. Petersburg, Russia","end":{"date-parts":[[2009,10,14]]}},"container-title":["2009 International Conference on Ultra Modern Telecommunications &amp; Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5340227\/5345316\/05350880.pdf?arnumber=5350880","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,24]],"date-time":"2020-05-24T01:43:44Z","timestamp":1590284624000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5350880\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icumt.2009.5350880","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}